Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
your DAtA MAy Be Protected.But iS it de-IdeNtIFIed?
ProtectING YoUr dAtA.ProtectING YoUr BUSINeSS.
ProVen exPertS in DAtA SecurityProtegrity is the only enterprise data security software platform that combines machine learning, data discovery, and classification tools along with scalable, data-centric encryption, tokenization, de-identification and masking to help businesses secure sensitive information everywhere while maintaining data usability.
esaData
Security Gateway
Application Protectors
Database Protectors
Big Data Protectors
EDW Protectors
File Protectors
Mainframe Protectors
Data In use
Data inMOTiOn
Data at rest
DIsCoVery
three of the MoSt coMMon DAtA-DriVen BuSineSS initiAtiVeS AnD rePreSentAtiVe Project tyPeS
1 Data MODernizaTiOn& analytICs
2 CUSTOMerenGaGeMenT
3 reGUlaTOrYCOMPlianCe
Big Data Analytics
Migration to the CloudMicroservices
Self-Service Data Consumption
E-commerce/Communities
Sales & Marketing Operations
Sales & Marketing BI/Reports
Single view of
Consumer
Big Data Customer Analytics
A full-SerVice SolutionProtegrity delivers a solution that meets security, business, and governance risk. The goal is to maximize Security at a minimal expense to Usability while maximizing a reduction in your risk posture.
ClassIFICatIon
DIsCoVery
proteCtIon
enFOrCeMenT
Key terMS
pseudonymization A method of de-identifying PII advocated by the GDPR to protect individuals’ rights during data processing.
tokenization A reversible method of pseudonymization that substitutes PII with random fake data that looks and feels the same, allowing legacy architecture underneath to be maintained. Tokens can keep data’s integral value fully or partially visible, enabling secure data processing and analytics.
encryption A mathematical method of rendering PII unintelligible to any person without the authority to access it.
anonymization Is a type of information sanitization whose intent is privacy protection. It is the process of removing personally identifiable information (PII) from data sets, so that the people whom the data describe remain anonymous.
MOniTOrinG
• What do you want to protect and • Why you need to protect it?
• Find where the sensitive data is located in the enterprise • How do you want to protect it and • Who is authorized to view it in the clear
• Enforce Policy as part of business processes
• Monitor when protected sensitive data has been unprotected
• Apply protection - in use - in motion - at rest
A DAtA Security Solution your entire BuSineSS cAn StAnD BehinD
Key Features
Centralized Visibility & reporting
Innovative technology
It seCurIty & Data proFessIonals
Through the ‘separation of duties’ framework, owners of data can determine and specify what data is protected along with monitoring the effectiveness of internal controls and conform with compliance assessors.
Data discovery and classification techniques allow you to stay secure and in control of sensitive data exposure by continuously measuring and assessing gaps and violations to drive timely actions.
Protegrity has developed innovative technologies including the industry’s first Vaultless Tokenization process, transparent security gateways that secure existing applications instantly, and distributed fault tolerant architectures.
BusIness proFessIonals
Peace of mind when it comes to complying with GDPR, PCI, PII, HIPAA and other government and regulatory demands.
Knowing where sensitive information resides sets realistic expectations for managing the scope, cost and timeframe of data projects, including security and regulatory compliance.
scalable & agile solution
Discover sensitive Data
Protection operations that only Protegrity provides are ideal for offering scalable and secure data flow.
The enterprise-wide solution delivers scalable and secure data flow for global companies looking to protect their data across countries, time-zones and cultures.
Rest assured you are investing in a future-proof technology that will lead to more opportunity to analyze your data and have you focus on your primary business objectives vs. worrying about data security.
www.protegrity.com
leader in Data-Centric security
200 brands world-wide are our customers including:
•20%ofallGlobalFortune500retailers
•25%ofGlobal500FinancialServiceinstitutions
•Morethan50ofTeradata’slargestcustomers
Headquartered in the usa
top Industry recognition and awards
PioneeringUniqueVaultlessandGatewayTechnologies
15+YearsFocusedonDataSecurity
PartnersforCustomerSuccess
Protegrity named crn’s 2017
Big Data 100 list
Protegrity named DBtA trend-Setter
for 2018
Protegrity Awarded Best Database Security
Solution
Market Guide for Data-centric Audit and
Protection
only Vendor 3 years in a row to Protect All Silos